Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-11-2020 20:19

General

  • Target

    f6eb3ee5a5791580cb437aed0ed50ee7.exe

  • Size

    346KB

  • MD5

    f6eb3ee5a5791580cb437aed0ed50ee7

  • SHA1

    42390aa36dd526141c798849a02dfdebcbd17eb5

  • SHA256

    12f341bc0f65e96848b4dd440afc7f653e883e740adcb677fc4f8b5ba5c38ef2

  • SHA512

    c94f46ffef834d6b00240bd4431f5dc191c75fbfa6b6ed31a7a94a23b93084a0d69d00cf24e66d8b919c8b58de365b70fa3bb461e51c153c7b747f6b0cbc0527

Malware Config

Extracted

Family

xpertrat

Version

3.0.10

Botnet

msn

C2

127.0.0.1:666

194.5.99.136:3135

Mutex

D7X4P1B8-Q5O3-S1E1-N0C3-X4R7E8E2T6P3

Signatures

  • CoreEntity .NET Packer 1 IoCs

    A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

  • UAC bypass 3 TTPs
  • Windows security bypass 2 TTPs
  • XpertRAT

    XpertRAT is a remote access trojan with various capabilities.

  • XpertRAT Core Payload 3 IoCs
  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6eb3ee5a5791580cb437aed0ed50ee7.exe
    "C:\Users\Admin\AppData\Local\Temp\f6eb3ee5a5791580cb437aed0ed50ee7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Users\Admin\AppData\Local\Temp\f6eb3ee5a5791580cb437aed0ed50ee7.exe
      "{path}"
      2⤵
      • Windows security modification
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:420
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        C:\Users\Admin\AppData\Local\Temp\f6eb3ee5a5791580cb437aed0ed50ee7.exe
        3⤵
        • Adds policy Run key to start application
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/360-16-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/360-15-0x0000000000401364-mapping.dmp

  • memory/360-14-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/420-9-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/420-11-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/420-10-0x00000000004010B8-mapping.dmp

  • memory/1112-4-0x0000000004790000-0x0000000004792000-memory.dmp

    Filesize

    8KB

  • memory/1112-8-0x0000000005390000-0x0000000005391000-memory.dmp

    Filesize

    4KB

  • memory/1112-7-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

    Filesize

    4KB

  • memory/1112-6-0x0000000004D10000-0x0000000004D43000-memory.dmp

    Filesize

    204KB

  • memory/1112-5-0x0000000008E00000-0x0000000008E01000-memory.dmp

    Filesize

    4KB

  • memory/1112-0-0x0000000073290000-0x000000007397E000-memory.dmp

    Filesize

    6.9MB

  • memory/1112-3-0x0000000004810000-0x0000000004849000-memory.dmp

    Filesize

    228KB

  • memory/1112-1-0x0000000000010000-0x0000000000011000-memory.dmp

    Filesize

    4KB